-
1
-
-
85083027758
-
Reconciling two views of cryptography (the computational soundness of formal encryption)
-
Martin Abadi and Philip Rogaway. Reconciling two views of cryptography (the computational soundness of formal encryption). Journal of Cryptology, 15(2):103-127, 2002.
-
(2002)
Journal of Cryptology
, vol.15
, Issue.2
, pp. 103-127
-
-
Abadi, M.1
Rogaway, P.2
-
2
-
-
33244467922
-
Security analysis of cryptographically controlled access to xml documents
-
Baltimore, Maryland, June, ACM
-
Martin Abadi and Bogdan Warinschi. Security analysis of cryptographically controlled access to xml documents. In Proceedings of the 24th ACM Symposium on Principles of Database Systems (PODS), pages 108-117, Baltimore, Maryland, June 2005. ACM.
-
(2005)
Proceedings of the 24th ACM Symposium on Principles of Database Systems (PODS)
, pp. 108-117
-
-
Abadi, M.1
Warinschi, B.2
-
3
-
-
85048601848
-
Cryptographic protocols provably secure against dynamic adversaries
-
Rainer A. Rueppel, editor, Advances in Cryptology -EUROCRYPT'92, of, Springer-Verlag, May
-
Donald Beaver and Stuart Haber. Cryptographic protocols provably secure against dynamic adversaries. In Rainer A. Rueppel, editor, Advances in Cryptology -EUROCRYPT'92, volume 658 of Lecture Notes in Computer Science, pages 307-323. Springer-Verlag, May 1992.
-
(1992)
Lecture Notes in Computer Science
, vol.658
, pp. 307-323
-
-
Beaver, D.1
Haber, S.2
-
4
-
-
0031351741
-
A concrete security treatment of symmetric encryption
-
IEEE Computer Society Press, October
-
Mihir Bellare, Anand Desai, Eric Jokipii, and Phillip Rogaway. A concrete security treatment of symmetric encryption. In 38th Annual Symposium on Foundations of Computer Science, pages 394-403. IEEE Computer Society Press, October 1997.
-
(1997)
38th Annual Symposium on Foundations of Computer Science
, pp. 394-403
-
-
Bellare, M.1
Desai, A.2
Jokipii, E.3
Rogaway, P.4
-
5
-
-
0029723583
-
Adaptively secure multiparty computation
-
ACM Press, May
-
Ran Canetti, Uriel Feige, Oded Goldreich, and Moni Naor. Adaptively secure multiparty computation. In 28th Annual ACM Symposium on Theory of Computing, pages 639-648. ACM Press, May 1996.
-
(1996)
28th Annual ACM Symposium on Theory of Computing
, pp. 639-648
-
-
Canetti, R.1
Feige, U.2
Goldreich, O.3
Naor, M.4
-
6
-
-
33745528593
-
Universally composable symbolic analysis of mutual authentication and key exchange protocols
-
Shai Halevi and Tal Rabin, editors, TCC '06: Third Theory of Cryptography Conference, of, Springer-Verlag
-
Ran Canetti and Jonathan Herzog. Universally composable symbolic analysis of mutual authentication and key exchange protocols. In Shai Halevi and Tal Rabin, editors, TCC '06: Third Theory of Cryptography Conference, volume 3876 of Lecture Notes in Computer Science, pages 380-403. Springer-Verlag, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.3876
, pp. 380-403
-
-
Canetti, R.1
Herzog, J.2
-
7
-
-
33947704230
-
Computationally sound compositional logic for key exchange protocols
-
IEEE Computer Society
-
Anupam Datta, Ante Derek, John Mitchell, and Bogdan Warinschi. Computationally sound compositional logic for key exchange protocols. In 19th IEEE Computer Security Foundations Workshop (CSFW '06), pages 321-334. IEEE Computer Society, 2006.
-
(2006)
19th IEEE Computer Security Foundations Workshop (CSFW '06)
, pp. 321-334
-
-
Datta, A.1
Derek, A.2
Mitchell, J.3
Warinschi, B.4
-
8
-
-
4243148483
-
Magic functions
-
Cynthia Dwork, Moni Naor, Omer Reingold, and Larry Stockmeyer. Magic functions. Journal of the ACM, 50(6):852-921, 2003.
-
(2003)
Journal of the ACM
, vol.50
, Issue.6
, pp. 852-921
-
-
Dwork, C.1
Naor, M.2
Reingold, O.3
Stockmeyer, L.4
-
9
-
-
84979291225
-
Broadcast encryption
-
Douglas R. Stinson, editor, Advances in Cryptology, CRYPTO'93, of, Springer-Verlag, August
-
Amos Fiat and Moni Naor. Broadcast encryption. In Douglas R. Stinson, editor, Advances in Cryptology - CRYPTO'93, volume 773 of Lecture Notes in Computer Science, pages 480-491. Springer-Verlag, August 1993.
-
(1993)
Lecture Notes in Computer Science
, vol.773
, pp. 480-491
-
-
Fiat, A.1
Naor, M.2
-
11
-
-
24144482305
-
Adaptive security of symbolic encryption
-
J. Kilian, editor, Theory of Cryptography Conference, TCC 2005, of, Cambridge, MA, USA, February, Springer-Verlag, Berlin, Germany
-
Daniele Micciancio and Saurabh Panjwani. Adaptive security of symbolic encryption. In J. Kilian, editor, Theory of Cryptography Conference, TCC 2005, volume 3378 of Lecture Notes in Computer Science, pages 169-187, Cambridge, MA, USA, February 2005. Springer-Verlag, Berlin, Germany.
-
(2005)
Lecture Notes in Computer Science
, vol.3378
, pp. 169-187
-
-
Micciancio, D.1
Panjwani, S.2
-
12
-
-
33746382900
-
Corrupting one vs. corrupting many: The case of broadcast and multicast encryption
-
Automata, Languages, and Programming: 33rd International Colloquium, ICALP 2006, Proceedings, Part II, of, Springer-Verlag, January
-
Daniele Micciancio and Saurabh Panjwani. Corrupting one vs. corrupting many: The case of broadcast and multicast encryption. In Automata, Languages, and Programming: 33rd International Colloquium, ICALP 2006, Proceedings, Part II, volume 4052 of Lecture Notes in Computer Science. Springer-Verlag, January 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.4052
-
-
Micciancio, D.1
Panjwani, S.2
-
13
-
-
35048899313
-
Soundness of formal encryption in the presence of active adversaries
-
Moni Naor, editor, TCC 2004: 1st Theory of Cryptography Conference, of, Springer-Verlag, February
-
Daniele Micciancio and Bogdan Warinschi. Soundness of formal encryption in the presence of active adversaries. In Moni Naor, editor, TCC 2004: 1st Theory of Cryptography Conference, volume 2951 of Lecture Notes in Computer Science, pages 133-151. Springer-Verlag, February 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.2951
, pp. 133-151
-
-
Micciancio, D.1
Warinschi, B.2
-
14
-
-
0030609312
-
Iolus: A framework for scalable secure multicasting
-
Cannes, France, September 14-18
-
Suvo Mittra. Iolus: A framework for scalable secure multicasting. In Proceedings of ACM SIGCOMM, pages 277-288, Cannes, France, September 14-18, 1997.
-
(1997)
Proceedings of ACM SIGCOMM
, pp. 277-288
-
-
Mittra, S.1
-
15
-
-
84880852861
-
Revocation and tracing schemes for stateless receivers
-
Joe Kilian, editor, Advances in Cryptology, CRYPTO 2001, of, Springer-Verlag, August
-
Dalit Naor, Moni Naor, and Jeffery Lotspiech. Revocation and tracing schemes for stateless receivers. In Joe Kilian, editor, Advances in Cryptology - CRYPTO 2001, volume 2139 of Lecture Notes in Computer Science, pages 41-62. Springer-Verlag, August 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2139
, pp. 41-62
-
-
Naor, D.1
Naor, M.2
Lotspiech, J.3
-
16
-
-
84937420653
-
Separating random oracle proofs from complexity theoretic proofs: The non-committing encryption case
-
Moti Yung, editor, Advances in Cryptology, CRYPTO 2002, of, Springer-Verlag, August
-
Jesper Buus Nielsen. Separating random oracle proofs from complexity theoretic proofs: The non-committing encryption case. In Moti Yung, editor, Advances in Cryptology - CRYPTO 2002, volume 2442 of Lecture Notes in Computer Science, pages 111-126. Springer-Verlag, August 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2442
, pp. 111-126
-
-
Buus Nielsen, J.1
-
17
-
-
0033893174
-
Secure group communications using key graphs
-
16-30, February
-
Chung Kei Wong, Mohamed Gouda, and Simon S. Lam. Secure group communications using key graphs. IEEE/ACM Transactions on Networking, 8(1):16-30, February 2000.
-
(2000)
IEEE/ACM Transactions on Networking
, vol.8
, Issue.1
-
-
Kei Wong, C.1
Gouda, M.2
Lam, S.S.3
|